[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [egov-ms] OASIS eGOV MS : NEW GUIDANCE DOCUMENTS
http://www.whitehouse.gov/omb/e-gov/ • Privacy Act of 1974 (Public Law 93-579), December 1974 • Federal Managers Financial Integrity Act (FMFIA), September 1982 • Computer Security Act of 1987, January 1988 • Paperwork Reduction Act (Public Law 104-13), May 1995 • Information Technology Management Reform Act of 1996 (Clinger-Cohen Act) (Public Law 104-106), February 1996 • USA PATRIOT Act (Public Law 107-56), October 2001 • E-Government Act of 2002 (Public Law 107-347), December 2002 • Federal Information Security Management Act of 2002 [FISMA] (Public Law 107-347, Title III), December 2002 • Code of Federal Regulations, Title 5, Administrative Personnel, Part 731, Suitability, Subpart A, Scope, Section106, Designation of Public Trust Positions and Investigative Requirements, (5 C.F.R.731.106) • Code of Federal Regulations, Title 5, Administrative Personnel, Part 930, Programs for Specific Positions and Examinations, Subpart C, Sections 930.301 through 930.305, Employees Responsible for the Management or Use of Federal Computer Systems, (5 C.F.R. 930.301-305) • Presidential Decision Directive 63 (PDD-63), Critical Information Protection, May 1998 • Homeland Security Presidential Directive (HSPD) 12, Policy for a Common Identification Standard for Federal Employees and Contractors, August 27, 2004 • Homeland Security Presidential Directive (HSPD-7), Critical Infrastructure Identification, Prioritization, and Protection • Department of Defense Instruction 8500.2, Information Assurance Implementation, February 2003 • Department of Defense, Chief Information Officer Memorandum, Encryption of Sensitive Unclassified Data at rest on Mobile Computing Devices and Removable Storage Media, July 03, 2007 • Director of Central Intelligence Directive 6/3 Manual, Protecting Sensitive Compartmented Information within Information Systems, June 1999 • Director of Central Intelligence Directive 6/3 Manual, Protecting Sensitive Compartmented Information within Information Systems, May 2000 • Office of Management and Budget (OMB) Circular A-130, Appendix III, Transmittal Memorandum #4, Management of Federal Information Resources, November 2000 • Office of Management and Budget, Circular A-130, Management of Federal Information Resources, Appendix III, Security of Federal Automated Information Systems, as revised November 2000 • Office of Management and Budget Memorandum M-02-01, Guidance for Preparing and Submitting Security Plans of Action and Milestones, October 2001 • Office of Management and Budget Memorandum M-03-19, Reporting Instructions for the Federal Information Security Management Act and Updated Guidance on Quarterly IT Security Reporting, August 2003 • Office of Management and Budget, Federal Enterprise Architecture Program Management Office, Business Reference Model (v2.0), June 2003 • Office of Management and Budget Memorandum M-03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002, September 26, 2003 • Office of Management and Budget Memorandum M-04-04, E-Authentication for Federal Agencies, December 2003 • Office of Management and Budget Memorandum M-05-24, Implementation of Homeland Security Presidential Directive (HSPD)12 – Policy for a Common Identification Standard for Federal Employees and Contractors, August 2005 • Office of Management and Budget Memorandum M-06-16, Protection of Sensitive Information, June 2006 • Office of Management and Budget Memorandum M-06-20, FY 2006 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, July 2006 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 140-2, Security Requirements for Cryptographic Modules, May 25, 2001 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 180-2, Secure Hash Standard (SHS), August 2002 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 186-2, Digital Signature Standard (DSS), January 2000 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 188, Standard Security Labels for Information Transfer, September 1994 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 190, Guidelines for the Use of Advanced Authentication Technology Alternatives, September 1994 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 197, Advanced Encryption Standards (AES), November 2001 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 198, The Keyed-Hash Message Authentication Code (HMAC), March 2002 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 199, Standards for Security Categorization of Federal Information and Information Systems, February 2004 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 200, Minimum Security Requirements for Federal Information and Information Systems, March 2006 • National Institute of Standards and Technology Federal Information Processing Standards (FIPS) Publication 201-1, Personal Identity Verification (PIV) of Federal Employees and Contractors, March 2006 • International Organization for Standardization/International Electrotechnical Commission 17799, Code of Practice for Information Security Management, June 2005 • International Organization for Standardization/International Electrotechnical Commission 27001, Information Security Management System Requirements, October 2005 • National Security Telecommunications and Information Systems Security (NSTISSI) 7003, Protective Distribution Systems (PDS), December 13, 1996 • NIST Special Publication 800-12, An Introduction to Computer Security: The NIST Handbook, October 1995 • NIST Special Publication 800-13, Telecommunications Security Guidelines for Telecommunications Management Network, October 1995 • NIST Special Publication 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, September 1996 • National Institute of Standards and Technology Special Publication 800-15, Minimum Interoperability Specifications for PKI Components (MISPC), Version 1, September 1997 • National Institute of Standards and Technology Special Publication 800-16, Information Technology Security Training Requirements: A Role- and Performance-Based Model, April 1998 • National Institute of Standards and Technology Special Publication 800-17, Modes of Operation Validation System (MOVS): Requirements and Procedures, February 1998 • National Institute of Standards and Technology Special Publication 800-18, Revision 1, Guide for Developing Security Plans for Federal Information Systems, February 2006 • National Institute of Standards and Technology Special Publication 800-19, Mobile Agent Security, October 1999 • National Institute of Standards and Technology Special Publication 800-20, Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures, April 2000 • National Institute of Standards and Technology Special Publication 800-21-1, Second Edition, Guideline for Implementing Cryptography in the Federal Government, December 2005 • National Institute of Standards and Technology Special Publication 800-22, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, May 2001 • National Institute of Standards and Technology Special Publication 800-23, Guideline to Federal Organizations on Security Assurance and Acquisition/Use Tested/Evaluated Products, August 2000 • National Institute of Standards and Technology Special Publication 800-24, PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does, August 2000 • National Institute of Standards and Technology Special Publication 800-25, Federal Agency Use of Public Key Technology for Digital Signatures and Authentication, October 2000 • National Institute of Standards and Technology Special Publication 800-27, Revision A, Engineering Principles for Information Technology Security (A Baseline for Achieving Security), June 2004 • National Institute of Standards and Technology Special Publication 800-28, Guidelines on Active Content and Mobile Code, October 2001 • National Institute of Standards and Technology Special Publication 800-29, A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, June 2001 • National Institute of Standards and Technology Special Publication 800-30, Risk Management Guide for Information Technology Systems, July 2002 • National Institute of Standards and Technology Special Publication 800-31, Intrusion Detection Systems (IDS), November 2001 • National Institute of Standards and Technology Special Publication 800-32, Introduction to Public Key Technology and the Federal PKI Infrastructure, February 2001 • National Institute of Standards and Technology Special Publication 800-33, Underlying Technical Models for Information Technology Security, December 2001 • National Institute of Standards and Technology Special Publication 800-34, Contingency Planning Guide for Information Technology Systems, June 2002 • National Institute of Standards and Technology Special Publication 800-35, Guide to Information Technology Security Services, October 2003 • National Institute of Standards and Technology Special Publication 800-36, Guide to Selecting information Security Products, October 2003 • National Institute of Standards and Technology Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems, May 2004 • National Institute of Standards and Technology Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation – Methods and Techniques, December 2001 • National Institute of Standards and Technology Special Publication 800-38B, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, May 2005 • National Institute of Standards and Technology Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality, May 2004 • National Institute of Standards and Technology Special Publication 800-38D, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication (Draft), April 2006 • National Institute of Standards and Technology Special Publication 800-40, Version 2, Creating a Patch and Vulnerability Management Program, November 2005 • National Institute of Standards and Technology Special Publication 800-41, Guidelines on Firewalls and Firewall Policy, January 2002 • National Institute of Standards and Technology Special Publication 800-42, Guide on Network Security Testing, October 2003 • National Institute of Standards and Technology Special Publication 800-43, Systems Administration Guidance for Windows 2000 Professional, November 2002 • National Institute of Standards and Technology Special Publication 800-44, Guidelines on Security Public Web Servers, September 2002 • National Institute of Standards and Technology Special Publication 800-45A (Draft), Guidelines on Electronic Mail Security, August 2006 • National Institute of Standards and Technology Special Publication 800-46, Security for Telecommuting and Broadband Communications, August 2002 • National Institute of Standards and Technology Special Publication 800-47, Security Guide for Interconnecting Information Technology Systems, August 2002 • National Institute of Standards and Technology Special Publication 800-48, Wireless Network Security: 802.11, Bluetooth, and Handheld Devices, November 2002 • National Institute of Standards and Technology Special Publication 800-49, Federal S/MIME V3 Client Profile, November 2002 • National Institute of Standards and Technology Special Publication 800-50, Building an Information Technology Security Awareness and Training Program, October 2003 • National Institute of Standards and Technology Special Publication 800-51, Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme, September 2002 • National Institute of Standards and Technology Special Publication 800-52, Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementation, June 2005 • National Institute of Standards and Technology Special Publication 800-53 Revision 1, Recommended Security Controls for Federal Information Systems, December 2006 • National Institute of Standards and Technology Special Publication 800-53A, Guide for Assessing the Security Controls in Federal Information Systems (Second Public Draft), April 2006 • National Institute of Standards and Technology Special Publication 800-54, Border Gateway Protocol Security (Draft), September 2006 • National Institute of Standards and Technology Special Publication 800-55, Security Metrics Guide for Information Technology Systems, July 2003 • National Institute of Standards and Technology Special Publication 800-56A, Recommendations for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, March 2006 • National Institute of Standards and Technology Special Publication 800-57, Recommendation on Key Management, August 2005 • National Institute of Standards and Technology Special Publication 800-58, Security Considerations for Voice Over IP Systems, January 2005 • National Institute of Standards and Technology Special Publication 800-59, Guideline for Identifying an Information System as a National Security System, August 2003 • National Institute of Standards and Technology Special Publication 800-60, Guide for Mapping Types of Information and Information Systems to Security Categories, June 2004 • National Institute of Standards and Technology Special Publication 800-61, Computer Security Incident Handling Guide, January 2004 • National Institute of Standards and Technology Special Publication 800-63, Version 1.0.2, Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Guidelines, April 2006 • National Institute of Standards and Technology Special Publication 800-64, Revision 1, Security Considerations in the Information System Development Life Cycle, June 2004 • National Institute of Standards and Technology Special Publication 800-65, Integrating Security into the Capital Planning and Investment Control Process, January 2005 • National Institute of Standards and Technology Special Publication 800-66, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, March 2005 • National Institute of Standards and Technology Special Publication 800-67, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, May 2004 • National Institute of Standards and Technology Special Publication 800-68, Guidance for Security Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist, October 2005 • National Institute of Standards and Technology Special Publication 800-69, Guidance for Security Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist, September 2006 • National Institute of Standards and Technology Special Publication 800-70, Security Configuration Checklists Program for IT Products: Guidance for Checklists Users and Developers, May 2005 • National Institute of Standards and Technology Special Publication 800-72, Guidelines on PDA Forensics, November 2004 • National Institute of Standards and Technology Special Publication 800-73, Revision 1, Interfaces for Personal Identity Verification, April 2006 • National Institute of Standards and Technology Special Publication 800-76-1, Biometric Data Specification for Personal Identity Verification (Draft), September 2006 • National Institute of Standards and Technology Special Publication 800-77, Guide to IPsec VPNs, December 2005 • National Institute of Standards and Technology Special Publication 800-78, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, April 2005 • National Institute of Standards and Technology Special Publication 800-79, Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations, July 2005 • National Institute of Standards and Technology Special Publication 800-81, Secure Domain Name System (DNS) Deployment Guide, May 2006 • National Institute of Standards and Technology Special Publication 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security (Draft), September 2006 • National Institute of Standards and Technology Special Publication 800-83, Guide to Malware Incident Prevention and Handling, November 2005 • National Institute of Standards and Technology Special Publication 800-84, Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, September 2006 • National Institute of Standards and Technology Special Publication 800-85A, PIV Card Application and Middleware Interface Test Guidelines, April 2006 • National Institute of Standards and Technology Special Publication 800-85B, PIV Data Model Test Guidelines, July 2006 • National Institute of Standards and Technology Special Publication 800-86, Guide to Integrating Forensic Techniques into Incident Response, August 2006 • National Institute of Standards and Technology Special Publication 800-87, Codes for the Identification of Federal and Federally-Assisted Organizations, January 2006 • National Institute of Standards and Technology Special Publication 800-88, Guidelines for Media Sanitization, September 2006 • National Institute of Standards and Technology Special Publication 800-89, Recommendation for Obtaining Assurances for Digital Signature Applications, November 2006 • National Institute of Standards and Technology Special Publication 800-90, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, June 2006 • National Institute of Standards and Technology Special Publication 800-92, Guide to Computer Security Log Management, September 2006 • National Institute of Standards and Technology Special Publication 800-94, Guide to Intrusion Detection and Prevention (IDP) Systems (Draft), August 2006 • National Institute of Standards and Technology Special Publication 800-95, Guide to Secure Web Services (Draft), August 2006 • National Institute of Standards and Technology Special Publication 800-96, PIV Card/Reader Interoperability Guidelines, September 2006 • National Institute of Standards and Technology Special Publication 800-97, Guide to IEEE 802.11: Establishing Robust Security Networks (Draft), June 2006 • National Institute of Standards and Technology Special Publication 800-98, Guidance for Security Radio Frequency Identification (RFID) Systems (Draft), September 2006 • National Institute of Standards and Technology Special Publication 800-100, Information Security Handbook: A Guide for Managers , October 2006 • National Institute of Standards and Technology Special Publication 800-101, Guidelines on Cell Phone Forensics (Draft), August 2006 • Government Accountability Office, Federal Information System Controls Audit Manual, GAO/AIMD-12.19.6, January 1999 • DISA Security Technical Implementation Guides (STIGs) and Checklists at http://csrc.nist.gov/pcig/cig.html • GSA Order CIO 2140.2, System Development Life Cycle (SDLC) Policy Handbook, April 20, 2004 • GSA Order CIO 2160.2, GSA Electronic Messaging Policy • GSA Order CIO 2100.2, GSA Wireless Local Area Network (LAN) Security, October 30, 2005 • GSA Order CIO P 2100.1D, GSA Information Technology (IT) Security Policy, June 21, 2007 • GSA Order CPO 1878.2, Conducting Privacy Impact Assessment, May 28, 2004 • GSA Order CPO 1878.1, GSA Privacy Act Program, October 27, 2003 • GSA Order CIO 2104.1, GSA Information Technology (IT) General Rules of Behavior, July 3, 2003 • GSA Handbook ADM P 9732.1C, Suitability and Personnel Security, February 17, 2006 • CIO Instructional Letter 05-03 Mandatory IT Security Training for Agency and Contractor Employees with Significant Security Responsibilities, April 21, 2005 • IT Security Procedural Guide: Bluetooth Security Hardening, CIO-IT Security-07-36, March 7, 2007 • IT Security Procedural Guide: Web Application Security Guide, CIO-IT Security-07-35, Revision 1, February 12, 2007 • IT Security Procedural Guide: CISCO CALL Manager and Unity Hardening, CIO-IT Security-07-34, February 12, 2007 • IT Security Procedural Guide: McAfee VirusScan 8.0i, CIO-IT Security-06-33, Revision 1, February 21, 2007 • IT Security Procedural Guide: Media Sanitization Guide, CIO-IT Security-06-32, December 21, 2006 • IT Security Procedural Guide: Firewall Change Request, CIO-IT Security-06-31, November 8, 2006 • IT Security Procedural Guide: Handling IT Security Incidents, CIO-IT Security-01-02, Revision 3, July 23, 2006 • Standard Operating Procedure For GSA HSPD-12 Personnel Security Process, October 26, 2005 • IT Security Procedural Guide: Home Users Guide, CIO-IT Security-04-24, Revision 1, September 29, 2005 • IT Security Procedural Guide: Developing a Configuration Management (CM) Plan, CIO-IT Security-01-05, Revision 1, September 9, 2005 • IT Security Procedural Guide: Termination and Transfer, CIO-IT Security-03-23, Revision 1, August 29, 2005 • IT Security Procedural Guide: Auditing and Monitoring, CIO-IT Security-01-08, Revision 1, June 29, 2005 • IT Security Procedural Guide: Password Generation and Protection, CIO-IT Security-01-01, Revision 1, June 23, 2005 • IT Security Procedural Guide: Access Control, CIO-IT Security-01-07, Revision 1, June 23, 2005 • IT Security Procedural Guide: FISMA/POA&M Implementation, CIO-IT Security-04-26, Revision 4, May 26, 2005 • IT Security Procedural Guide: IT Security Training and Awareness Program, CIO-IT Security-05-29, Revision 1 April 27, 2006 • IT Security Procedural Guide: Contingency Plan Testing, CIO-IT Security-06-29, Revision 1, February 22, 2007 • IT Security Procedural Guide: Managing Enterprise Risk, CIO-IT Security-06-30, Revision 3, March 20, 2007 • IT Security Procedural Guide: Windows XP Professional Hardening, CIO-IT Security-03-22, Revision 6a, March 3, 2006 • IT Security Procedural Guide: Oracle Database Hardening, CIO-IT Security-05-28, March 29, 2005 • IT Security Procedural Guide: CISCO Router Hardening, CIO-IT Security-05-27, March 8, 2005 • IT Security Procedural Guide: Windows 2000 Professional Hardening, CIO-IT Security-02-15, Revision 3, November 16, 2004 • IT Security Procedural Guide: Windows 2003 Server Hardening, CIO-IT Security-04-25, Revision 2, June 21, 2006 • IT Security Procedural Guide: Sun Solaris Hardening, CIO-IT Security-02-20, August 30, 2002 • IT Security Procedural Guide: IIS 5.0 Server Hardening Implementation Guide, CIO-IT Security-02-19, July 24, 2002 • IT Security Procedural Guide: IIS 5.0 Server Hardening, CIO-IT Security-02-18, July 24, 2002 • IT Security Procedural Guide: Windows 2000 Server Hardening Implementation Guide, CIO-IT Security-02-17, July 24, 2002 • IT Security Procedural Guide: Windows 2000 Server Hardening, CIO-IT Security-02-16, July 24, 2002 • IT Security Procedural Guide: Microsoft IIS 4.0 Hardening, CIO-IT Security-01-14, May 14, 2001 • IT Security Procedural Guide: Windows NT 4.0 Hardening, CIO-IT Security-01-13, May 14, 2001 • GSA Internet Explorer 6.0 Configuration Guide • FTS CIO Policy Memo 03-08 Account Closeout Procedures • FTS CIO Policy Memo 03-04 Local Workstation Access Rights • Computer Fraud & Abuse of 1986, as amended, Public Law 99-474 • OMB Memorandum M-01-08 Colin Wallis wrote: > This query is directed to our US members. > > One of the things that we struggled with was a 'balance' and that is reflected in the references. You'll see that many of the refs are UK (or dare I say 'Commonwealth') based.. > > Can the US folk direct us to specific references regarding eGovernment in the US? I have tried to in the past and found the cupboard curiously bare...hence the reliance on our personal knowledge. > > Now maybe that's because I'm not searching correctly but ..any help would be appreciated. If we found a really pithy and relevant reference we could analyse, we could modify the text accordingly and include the ref. > > Thanks > Cheers > Colin > > -----Original Message----- > From: Colin Wallis > Sent: Wednesday, 17 March 2010 10:37 a.m. > To: 'tony@yaanatech.com' > Cc: egov-ms@lists.oasis-open.org > Subject: RE: [egov-ms] OASIS eGOV MS : NEW GUIDANCE DOCUMENTS > > Brilliant insight Tony. Thanks very much. Much deeper than can be gleaned from external sources:-) > > Cheers > Colin > -----Original Message----- > From: Tony Rutkowski [mailto:tony@yaanatech.com] > Sent: Wednesday, 17 March 2010 10:29 a.m. > To: Colin Wallis > Cc: Daniel.E.Turissini.(Affiliate).ORC1000000106.ID; John Borras; egov-ms@lists.oasis-open.org > Subject: Re: [egov-ms] OASIS eGOV MS : NEW GUIDANCE DOCUMENTS > > On 3/16/2010 4:33 PM, Colin Wallis wrote: > >> Look at Lesson 1 and Lesson 3 again for example. Do you not see the US experience reflected here? >> >> > > The US problem is significantly exacerbated by legal > jurisdiction issues and related historical decisions. > I was at the FCC for about 12 years during some of > the history. > > The US has this strong division between public > infrastructure and services (meaning available to > the public) and governmental (largely Federal). > A number of Federal agencies attend to the care > and feeding of their domain, especially the multiple > pieces of DOD and GSA. An entirely separate > "independent agency" - the FCC - is responsible > for everything non-Federal. It even reports to > the legislative branch of the government, and not > the executive. > > To make matters worse, the FCC beginning with > the original Computer I proceeding in 1966 made > the (in retrospect) profound mistake of not asserting > its jurisdiction over anything other than radio and > common carrier services. Cable has peeked in and > out of that mix. In a rational world, one would have > expected a FCC like entity to have dealt with security, > infrastructure protection, etc, for all information > infrastructure/services provided to the public. Instead, > they played dead and hired ever larger number of lawyers > and getting rid of engineers as they debated "angels on > a head of a pin" kinds of issues concerning jurisdiction. > > That proclivity tilted back slightly over the past couple > of years in the utterly bizarre area of "network neutrality" > in a foolhardy attempt to control how transport providers > manage their networks for "neutrality." Even today, > the only vision they evince is pushing out bandwidth > to rural areas. For the FCC, it's all a "black box" for > to diddle with to meet the latest lobbying craze from > what's known as K-street. > > On a slightly separate note, my current admonition as > to e-government security is simply to enter "https://" > and some government website. You can quickly > separate the clueless from the rest. If you get an > EVcert, they get extra points! > > cheers, > tony > > ==== > CAUTION: This email message and any attachments contain information that may be confidential and may be LEGALLY PRIVILEGED. If you are not the intended recipient, any use, disclosure or copying of this message or attachments is strictly prohibited. If you have received this email message in error please notify us immediately and erase all copies of the message and attachments. Thank you. > ==== > > --------------------------------------------------------------------- > To unsubscribe from this mail list, you must leave the OASIS TC that > generates this mail. Follow this link to all your TCs in OASIS at: > https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php > > -- Daniel E. Turissini, CEO, Operational Research Consultants, Inc. 11250 Waples Mill Road, South Tower, Suite 210, Fairfax, Virginia 22030 703-246-8550 :: View the ORC/ FiXs Presentation [http://tinyurl.com/p6rs52] from AFCEA LandWarNet 2009 :: The information transmitted in this e-mail is for the exclusive use of the person or entity to which it is addressed and may contain legally privileged or confidential information. If you are not the intended recipient of this e-mail, you are prohibited from reading, printing, duplicating, disseminating or otherwise using or acting in reliance upon this information. If you have received this information in error, please notify the sender at Operational Research Consultants, Inc. immediately, delete this information from your computer and destroy all copies of the information.
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]